The 'Boring Stuff' Is Still Breaking Companies

Jim Leone

2/1/20263 min read

It's interesting that most security incidents don’t start with elite hackers, zero-days, or nation-state tooling. They start with something boring. Such as something forgotten, something “temporary”, or something that worked fine for years, until it didn’t.

While captivating headlines focus on sophisticated attacks, I believe the reality inside most organizations is far less cinematic. The root cause is usually not advanced adversaries, it’s operational neglect hiding in plain sight. And it’s still breaking companies every day.

The Myth of the “Advanced Attack”

There’s comfort in believing breaches require extraordinary attackers. If the threat is advanced enough, failure feels understandable, or even excusable. But most post-incident reviews tell a different story. A VPN account that should have been disabled years ago, a service account with domain admin privileges “for legacy reasons”, a firewall rule opened during an outage and never closed, an exposed management interface no one realized was public, or an asset that existed… but not in any inventory

None of these are exotic, all of them are common. And that’s the problem.

Here's Where the Real Risk Lives

The most dangerous risks in an environment are rarely the ones people are actively discussing. They live in the spaces between teams, tools, and responsibilities.

1. Asset Inventory Drift

You can’t protect what you don’t know exists, but most environments quietly grow beyond what anyone can fully track. Virtual machines spun up during emergencies, test systems that became “production”, or cloud resources created by contractors who left years ago. Over time, inventory stops being a source of truth and becomes a best guess.

2. “Temporary” Access That Becomes Permanent

Emergency access has a way of overstaying its welcome...

  • Temporary admin rights

  • Break-glass accounts

  • Vendor access granted during deployments

These rarely get revisited, because nothing breaks immediately. And when nothing breaks, urgency fades. Well...until it doesn’t.

3. Legacy Decisions No One Wants to Own

Every environment carries decisions made under pressure...

  • “We’ll clean this up after the project.”

  • “We can’t touch that system, it’s fragile.”

  • “That account can’t be disabled; no one knows what it’s tied to.”

Over time, these become institutional folklore instead of documented risk. And folklore doesn’t show up in audits, until an incident forces it into daylight.

Why Even Experienced Teams Miss This

It's not incompetence. In fact, the opposite is often true. Mature teams are extremely busy. They’re delivering uptime, meeting SLAs, responding to incidents, onboarding users, integrating tools, and keeping the business moving. The boring stuff doesn’t scream for attention. It simply whispers, and whispers are easy to ignore when alarms are constantly ringing elsewhere.

I Feel This Isn't a Tooling Fail, It's an Ownership One

Most organizations already own tools that could surface these issues such as vulnerability scanners, EDR platforms, SIEMs, IAM solutions, and network monitoring. The problem isn’t a lack of technology, it’s a lack of clear ownership.

Who owns...

  • Dormant accounts?

  • Orphaned systems?

  • Access exceptions?

  • Risk acceptance decisions?

If the answer is “everyone” or “we assumed,” well then... your risk is already unmanaged.

This Is an Executive Problem, Not Just a Technical One

The “boring stuff” survives because it’s invisible to leadership, until it explodes. Most executives rarely ask...

  • What have we intentionally left unresolved?

  • What risks are we accepting by default rather than by decision?

  • What assumptions are we no longer validating?

These aren’t technical questions, they’re governance questions. And they matter more than the next shiny security product.

Organizations that avoid these failures tend to do a few unglamorous things well...

  • Maintain a living asset inventory, not a spreadsheet snapshot

  • Regularly review access exceptions, not just policy compliance

  • Treat “temporary” as a tracked state with expiration

  • Document and revisit risk acceptance decisions

  • Encourage teams to surface truths without blame

None of this is exciting, but all of it works.

Security doesn’t usually fail in dramatic ways. It simply erodes over time. Quietly, gradually, and predictably. The organizations that stay resilient aren’t the ones chasing every new threat headline. They’re the ones that consistently revisit the basics, even when nothing seems wrong. Because in security, the most dangerous words are still...

“That’s been there forever.”